2021-01-09 14:45:11 +00:00
id : CVE-2019-10092
info :
2022-08-12 00:45:50 +00:00
name : Apache HTTP Server <=2.4.39 - HTML Injection/Partial Cross-Site Scripting
2021-04-06 06:46:11 +00:00
author : pdteam
2021-01-09 14:45:11 +00:00
severity : medium
2022-08-12 00:45:50 +00:00
description : Apache HTTP Server versions 2.4.0 through 2.4.39 are vulnerable to a limited cross-site scripting issue affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to inject malicious HTML code or execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:53:28 +00:00
remediation : |
Upgrade to Apache HTTP Server version 2.4.40 or later, which includes a fix for this vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-03-25 10:02:27 +00:00
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd
- https://httpd.apache.org/security/vulnerabilities_24.html
2022-05-17 09:18:12 +00:00
- https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html
2022-08-12 00:45:50 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-10092
2023-07-11 19:49:27 +00:00
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-10092
cwe-id : CWE-79
2024-01-14 13:49:27 +00:00
epss-score : 0.07116
2024-05-31 19:23:20 +00:00
epss-percentile : 0.93987
2023-09-06 12:53:28 +00:00
cpe : cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : apache
product : http_server
2024-05-31 19:23:20 +00:00
shodan-query : cpe:"cpe:2.3:a:apache:http_server"
2023-07-11 19:49:27 +00:00
tags : cve,cve2019,apache,htmli,injection
2021-01-09 14:45:11 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-01-09 14:45:11 +00:00
- method : GET
path :
- '{{BaseURL}}/%5cgoogle.com/evil.html'
2023-07-11 19:49:27 +00:00
2021-01-09 14:45:11 +00:00
matchers :
- type : word
words :
2022-01-04 19:34:16 +00:00
- "<a href=\"/\\google.com/evil.html\">"
2024-06-01 06:53:00 +00:00
# digest: 4b0a00483046022100fe06ef219910cb21377ede6e43897e9d1ba840a59568b50da8ada8b648d780d4022100d5d67b48a8bfbc03e42ed70988267121fe056df8f26288784a7bef6bb0a65f52:922c64590222798bb761d5b6d8e72950